ep's blog

Network World: The 5 essential patches of 2009


This is an interesting article by Network World which reviews the top patches of 2009.  The list was compiled by Qualys' chief technology officer, Wolfgang Kandek and a panel of patch and vulnerability experts to find the five security fixes everyone should deploy from the last 12 months".

[DSA-1975-1] Security Support for Debian 4.0 to be discontinued on February 15th


For anyone still on Debian 4.0, now is a good time to work on a
migration plan to Debian 5.0. Debian will stop releasing security
updates after February 15th for 4.0.

This is also a good time for Ubuntu users to check their distribution
for similar announcements. Ubuntu is based on Debian.


RHEL5 kernel security and bug fix update


Here is a new kernel update, unrelated to the last update sent out 9
days ago. It fixes a myriad of new problems including Denial of
Service, Privilege Escalation, kernel panic, file rewrite, and
information leaks to name a few.

It is recommended that RHEL5 systems be updated and rebooted to mitigate
the risk from these issues.


Adobe Shockwave Player Four Integer Overflow Vulnerabilities


"Affected: Adobe Shockwave Player"

"Secunia Research has discovered four vulnerabilities in Adobe
Shockwave Player, which can be exploited by malicious people to
compromise a user's system.

The vulnerabilities are caused by four integer overflow errors
when processing a certain block type. These can be exploited to cause
heap-based buffer overflows via specially crafted Shockwave files.

Cisco IOS XR Software SSH Denial of Service Vulnerability


"The SSH server implementation in Cisco IOS XR Software contains a
vulnerability that an unauthenticated, remote user could exploit to
cause a denial of service condition."

"Products Confirmed Not Vulnerable

SSH server implementations in Cisco IOS Software and Cisco IOS XE
Software are not affected by this vulnerability."

Microsoft Windows NT #GP Trap Handler Allows Users to Switch Kernel Stack (affects Windows NT through 7)



In order to support BIOS service routines in legacy 16bit applications,
the Windows NT Kernel supports the concept of BIOS calls in the
Virtual-8086 mode monitor code."

"Upon successful exploitation, the kernel stack is switched to an attacker
specified address." This would allow arbitrary code execution with
escalated privileges.

HP Power Manager, Remote Execution of Arbitrary Code


"Potential security vulnerabilities have been identified with HP Power
Manager. The vulnerabilities could be exploited remotely to execute
arbitrary code.

References: CVE-2009-3999, CVE-2009-4000

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP Power Manager earlier than v4.2.10"

It is recommended that users of this software update immediately to
avoid risk.